Skip to main content

Research Repository

Advanced Search

Outputs (408)

Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010). Novel information sharing syntax for data sharing between police and community partners, using role-based security.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing syntax for data sharing between police and community partners, using role-based security..

Novel information sharing architecture between the Police and their community partners. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2010). Novel information sharing architecture between the Police and their community partners.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing architecture between the Police and their community partners..

Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010). Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering (131-136). https://doi.org/10.1109/SIBIRCON.2010.555532

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010). Analysis of malicious affiliate network activity as a test case for an investigatory framework. In Proceedings of 9th European Conference on Information Warfare and Security (2

Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..

Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009). Application and analysis of private matching schemes based on commutative cryptosystems.

Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..

The impact of routing schemes on group communication throughput in scalable networks. (2008)
Presentation / Conference Contribution
Al-Dubai, A. (2008). The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium (1-8). https://doi.org/10.1109/IPDPS.2008.4536490

Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited operating conditions or within the context of deterministic routing algorithms.... Read More about The impact of routing schemes on group communication throughput in scalable networks..

Validation of 1-N OT algorithms in privacy-preserving investigations. (2008)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Saliou, L. (2008). Validation of 1-N OT algorithms in privacy-preserving investigations.

Most organisations relay on digital information systems (ISs) in day-to-day operations, and often sensitive data about employees and customers are stored in such systems. This, effectively, makes ISs enhanced surveillance measures, which can reach fu... Read More about Validation of 1-N OT algorithms in privacy-preserving investigations..

Investigating false positive reduction in HTTP via procedure analysis. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Investigating false positive reduction in HTTP via procedure analysis. . https://doi.org/10.1109/ICNS.2006.65

This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection systems (IDSs) are discussed. Then we present our research efforts in the form... Read More about Investigating false positive reduction in HTTP via procedure analysis..

Hierarchical Home Agent Architecture for Mobile IP Communications (2006)
Presentation / Conference Contribution
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006). Hierarchical Home Agent Architecture for Mobile IP Communications. In 11th IEEE Symposium on Computers and Communications, 2006. ISCC '06. Proceedings (136-141). https://doi.org/10.1109/isc

While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node uses multiple HAs located in different physical links in his home network... Read More about Hierarchical Home Agent Architecture for Mobile IP Communications.

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In W. Hutchinson (Ed.),

Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical stru... Read More about Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations..

Enhancing intrusion detection via an active target host. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006

Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of networked resources. In other to reduce these attacks, Intrusion Detection Syste... Read More about Enhancing intrusion detection via an active target host..

A framework to detect novel computer viruses via system calls. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). A framework to detect novel computer viruses via system calls. In M. Merabti, R. Pereira, & O. Abuelma'atti (Eds.), 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadca

This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objecti... Read More about A framework to detect novel computer viruses via system calls..

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification (2005)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In W. Hutchinson (Ed.),

This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, and also an automated verification process. The framework uses a security com... Read More about Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.

Agent-based forensic investigations with an integrated framework. (2005)
Presentation / Conference Contribution
Buchanan, W. J., Graves, J., Saliou, L., Sebea, A. L., & Migas, N. (2005). Agent-based forensic investigations with an integrated framework.

Forensics investigations can be flawed for many reasons, such as that they can lack any real evidence of an incident. Also, it can be the case that the legal rights of an individual has been breached, or that the steps taken in the investigation cann... Read More about Agent-based forensic investigations with an integrated framework..

Analysis and detection of cruising computer viruses. (2004)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2004). Analysis and detection of cruising computer viruses.

Viral propagation is an important phenomenon of computer viruses. This paper focuses on viral movement and proposes the feasibility of a computer virus which is able to target a specific host, known as cruising. A novel component, based on target pro... Read More about Analysis and detection of cruising computer viruses..

Analysis and migration of location-finding methods for GSM and 3G networks. (2004)
Presentation / Conference Contribution
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004). Analysis and migration of location-finding methods for GSM and 3G networks. . https://doi.org/10.1049/cp%3A20040695

This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observed time difference). It shows how these techniques can be applied to the fu... Read More about Analysis and migration of location-finding methods for GSM and 3G networks..

Migration of mobile agents in ad-hoc wireless networks. (2004)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2004). Migration of mobile agents in ad-hoc wireless networks. In Proceeding of the 11th IEEE International Conference and Workshop on the Engineering of Computer-based systems (530-535). https://doi.org/10.110

This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to perform routing, network discovery, and automatic network reconfiguration, in... Read More about Migration of mobile agents in ad-hoc wireless networks..

MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks. (2003)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2003). MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks.

The purpose of MARIAN is to investigate the degree of suitability for mobile agent technology in routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. This research proposes to assess different models of the usage of... Read More about MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks..

An agent based Bayesian forecasting model for enhanced network security. (2001)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001). An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-

Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and validation. They also tend to be centralized in their approach which makes... Read More about An agent based Bayesian forecasting model for enhanced network security..